1.
A network consists of various remote sites that connect back to two main locations. Pete, the security administrator, needs to block TELNET access into the network. Which of the following, by default, would be the BEST choice to accomplish this goal?
2.
Pete, a security administrator, is informed that people from the HR department should not have access to the accounting department's server, and the accounting department should not have access to the HR department's server. The network is separated by switches. Which of the following is designed to keep the HR department users from accessing the accounting department's server and vice-versa?
3.
Which of the following is BEST utilized to actively test security controls on a particular system?
4.
Pete, an employee, attempts to visit a popular social networking site but is blocked. Instead, a page is displayed notifying him that this site cannot be visited. Which of the following is MOST likely blocking Pete's access to this site?
5.
Which of the following has serious security implications for large organizations and can potentially allow an attacker to capture conversations?
6.
Upper management decides which risk to mitigate based on cost. This is an example of:
7.
Isolation mode on an AP provides which of the following functionality types?
8.
Employees are reporting that unauthorized personnel are in secure areas of the building. This is MOST likely due to lack of security awareness in which of the following areas?
9.
A forensic image of a hard drive has been created. Which of the following can be used to demonstrate the image has not been tampered with?
10.
Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?